Encryption Requirements Sample Clauses

Encryption Requirements. DST will not locally store Fund Data on any laptops or mobile devices (e.g., Blackberries, PDAs) managed by DST.
AutoNDA by SimpleDocs
Encryption Requirements. Transfer Agent will not locally store Fund Data on any laptops or mobile devices (e.g., Blackberries, PDAs) managed by Transfer Agent.
Encryption Requirements. Seller will use, and will cause Seller Personnel to use, appropriate forms of encryption or other secure technologies at all times in connection with the Processing of Carrier Information, including in connection with any transfer, communication, remote access or storage (including back-up storage) of Carrier Information, as authorized or permitted under the Agreement and/or Order. Notwithstanding any provision to the contrary herein, Buyer Personal Information shall not be stored on any Seller mobile computing devices (e.g. laptop computers, PDAs (personal digital assistants), etc.)
Encryption Requirements. State Street will encrypt any laptops or mobile devices (e.g., tablets and smartphones) containing Client Data used by State Street’s personnel using an industry recognized encryption algorithm with at least 256 bit encryption AES (or equivalent).
Encryption Requirements. DST shall encrypt any laptops or mobile devices (e.g., Blackberries, PDAs) containing Client Data used by DST’s personnel using an industry recognized encryption algorithm with at least 256 bit encryption AES (or equivalent).
Encryption Requirements. The Contractor shall establish, maintain, and enforce (and Contractor shall ensure its affiliates and subcontractors establish, maintain, and enforce) a written policy that prohibits the sending of any State Data that is customarily considered to be sensitive or confidential in nature (including social security number, home address and medical information) by electronic mail. This written policy must be provided to the Department within sixty (60) days of execution of the Contract. The Contractor agrees to encrypt the transmission of all State Data that is customarily considered to be sensitive or confidential in nature (including social security number, home address and medical information), whether or not it is sent through MFMP or through other electronic means. The Contractor shall obtain the Department’s approval for the encryption software and procedures used by Contractor. The foregoing encryption requirement under this section shall not apply to messages sent over secure, dedicated lines: a. From Contractor employees and Individual Contractors to other Contractor employees or Individual Contractors, or b. From the Contractor to the Department, a Covered Entity or a member of the Covered Population. The Contractor shall be permitted to receive emails or other electronic transmissions from the Department or a Customer containing any State Data; further, in the event of such transmission, Contractor shall protect the confidentiality of such data. Contractor shall ensure that all laptop computers, tablets and other portable computer or data storage devices used to access State Data shall have “full disc” encryption. Contractor shall require its subcontractors to comply with the requirements to the extent applicable to subcontractor’s services.
Encryption Requirements. The Service Provider shall establish, maintain, and enforce (and Service Provider shall ensure its affiliates and Subcontractors establish, maintain, and enforce) a policy that prohibits the sending of any SOF Production Data that is customarily considered to be sensitive or confidential in nature (e.g., social security number) by electronic mail. The Service Provider agrees to encrypt the transmission of all SOF Production Data that is customarily considered to be sensitive or confidential in nature (e.g., social security number), whether or not it is sent through the HRIS or through other electronic means. The Service Provider shall obtain the Department’s approval for the encryption software and procedures used by Service Provider. The foregoing encryption requirement under this Section shall not apply to messages sent over secure, dedicated lines (i) from Service Provider employees and Independent Contractors to other Service Provider employees or Independent Contractors, or (ii) from the Service Provider to the Department, a Covered Entity or a member of the Covered Population. Further, notwithstanding any provision in this Contract to the contrary, Service Provider shall be permitted to receive emails or other electronic transmissions from the Department, a Covered Entity or a member of the Covered Population containing any SOF Production Data; further, in the event of such transmission, Service Provider shall protect the confidentiality of such data. Service Provider shall ensure that all laptop computers, tablets and other portable computer or data storage devices used to access SOF Production Data shall have “full disc” encryption. Service Provider shall require its Subcontractors to comply with the requirements to the extent applicable to Subcontractor’s Services.
AutoNDA by SimpleDocs
Encryption Requirements. The following requirements apply when supplier has possession of UTC Information. Encryption algorithms used must be of sufficient strength to equate to 128-bit RC-4 or better. All cryptography technologies used must be published and approved by the general cryptographic community. (a) Encrypt all UTC Information stored on Supplier computer systems and backup media. (b) Encrypt all UTC Information transferred across public networks (c) Encrypt all UTC Information stored on Supplier mobile computing devices (e.g. laptop computers, PDAs (personal digital assistants), etc.)
Encryption Requirements. When communicating the Income Withholding for Support (IWO) through electronic transmission, precautions must be taken to ensure the security of the data. Child support agencies are encouraged to use the electronic applications provided by the federal Office of Child Support Enforcement. Other electronic means, such as encrypted attachments to emails, may be used if the encryption method is compliant with Federal Information Processing Standard (FIPS) Publication 140-2 (FIPS PUB 140-2).
Encryption Requirements. The Contractor shall establish, maintain, and enforce (and Contractor shall ensure its affiliates and Subcontractors establish, maintain, and enforce) a policy that prohibits the sending of any State of Florida Data that is customarily considered to be sensitive or confidential in nature (e.g., social security number) by electronic mail. The Contractor agrees to encrypt the transmission of all State of Florida Data that is customarily considered to be sensitive or confidential in nature (e.g., social security number), whether or not it is sent through the Contractor’s system(s) or through other electronic means. The Contractor shall obtain the Department’s approval for the encryption software and procedures used by Contractor. The foregoing encryption requirement under this Section shall not apply to messages sent over secure, dedicated lines from Contractor employees and Independent Contractors to other Contractor employees or Independent Contractors. Further, notwithstanding any provision in this Contract to the contrary, Contractor shall be permitted to receive emails or other electronic transmissions from the Department, People First or a Participant containing any State of Florida Data; further, in the event of such transmission, Contractor shall protect the confidentiality of such data. Contractor shall ensure that all laptop computers, tablets and other portable computer or data storage devices used to access State of Florida Data shall have “full disc” encryption. Contractor shall require its Subcontractors to comply with the requirements to the extent applicable to Subcontractor’s Services.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!